Skip to main content

Vulnerability Discovery in Network Systems Based on Human-Machine Collective Intelligence

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1131))

Abstract

Network vulnerability mining is an important topic in cyberspace security. Network vulnerabilities enable attackers to obtain sensitive information from computer systems, control computer systems illegally and cause severe damage. More effective vulnerability mining requires wider participation of cybersecurity engineers and intelligent computing devices as cooperation among the mining participants could take advantages of the complementarity capabilities of human and machine. The human and resource cost of network vulnerability mining can be remarkably reduced and the mining efficiency is improved accordingly. The principles and engineering mechanisms of introducing collective intelligence to network vulnerability mining is discussed in the paper and a vulnerability mining platform based on crowd intelligence is established following a four-layer system structure. Experimental tests showed that cooperation enables mining participants to work better and learn from empirical information, while better mining results could be obtained through procedure optimization.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Benkler, Y., Hassan, M.: Collective Intelligence: Creating a Prosperous World at Peace. Earth Intelligence Network, Oakton (2008)

    Google Scholar 

  2. Shen, J., Deng, C., Gao, X.: Attraction recommendation: towards personalized tourism via collective intelligence. Neurocomputing 173, 789–798 (2016)

    Article  Google Scholar 

  3. Introne, J., Goggins, S.: Advice reification learning and emergent collective intelligence in online health support communities. Comput. Hum. Behav. 99, 205–218 (2019)

    Article  Google Scholar 

  4. Jeng, Y., Huang, Y.: Dynamic learning paths framework based on collective intelligence from learners. Comput. Hum. Behav. 100, 242–251 (2019)

    Article  Google Scholar 

  5. Le, V., Nguyen, H., Lu, D., Nguyen N.: A solution for automatically malicious web shell and web application vulnerability detection. In: 8th International Conference on Computational Collective Intelligence (ICCCI), pp. 367–378. Springer, Cham (2016)

    Google Scholar 

  6. Le, V., et al.: GuruWS: a hybrid platform for detecting malicious web shells and web application vulnerabilities. In: Transactions on Computational Collective Intelligence XXXII, pp. 184–208. Springer, Heidelberg (2019)

    Google Scholar 

Download references

Acknowledgments

This work is supported by National Key R&D Program of China No. 2017YFB08029 and is supported by Sichuan Science and Technology Program No. 2017GZDZX0002.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ye Han .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Han, Y., Chen, J., Rao, Z., Wang, Y., Liu, J. (2020). Vulnerability Discovery in Network Systems Based on Human-Machine Collective Intelligence. In: Ahram, T., Karwowski, W., Vergnano, A., Leali, F., Taiar, R. (eds) Intelligent Human Systems Integration 2020. IHSI 2020. Advances in Intelligent Systems and Computing, vol 1131. Springer, Cham. https://doi.org/10.1007/978-3-030-39512-4_71

Download citation

Publish with us

Policies and ethics